#RSAC SESSION ID: GPS-F02A Strategies for a Successful Security and Digital Transformation Jonathan Nguyen-Duy Vice President, Strategic Programs jnguyenduy@fortinet.com
AGENDA 2017 Digital transformation & cybersecurity outlook New cyber realities Distributed network segmentation & virtualization Applying security for digital transformation Summary
DX & Fourth Industrial Revolution 1st Mechanization, water power, steam power 2nd Mass Production, Assembly Line, Electricity Digitization to innovation New business models 3rd Demand & supply 4th side changes Better customer engagement Computer and Cyber Physical Systems Automation Everything is accelerated 1780 1870 1970 2016 Source: Christoph Roser at Allaboutlean.com
Digital Transformation Accelerates Everything
Digital Transformation & Disruption Disruption of traditional enterprises challenged by digital native competitors Definition: Transformation based on leveraging data via technologies to generate deep insights that drive exponential business growth Objective: Data -driven business to enrich customer experience via customer targeting & engagement
Digital Transformation (DX) DX enabled by key technologies Distributed computing (Edge/Data Center/Cloud) Ubiquitous broadband (5G) Internet-of-things Big data analytics Key trends Omni-dimensional customer engagement Expanding number of devices & technologies Complexity & security challenges Forces a re-thinking of security From the data center, to the cloud, to the edge and IoT
Cyber Complexity Requires a New Approach #RSAC Average enterprise: 200+ apps 70+ security devices & services 20+ connected devices per person 2+ public & private clouds 3 TB+ per person per day Shadow IT Supply chain interconnections DX initiatives Big data IoT Virtualization
Fortinet Threat Landscape Report CISO role productivity vs security DX: Cloud, IoT, 5G & data analytics Automated & opportunistic attacks Disappearing perimeter Complexity and Persistence are key Complexity of threats Overwhelmed IT teams Shortage of skills No need to compromise Distributed network segmentation Virtualization Best-in-class tools & processes
2017 Verizon Data Breach Investigations Report Who s behind the breaches? 75% perpetrated by outsiders 25% involved internal actors 18% conducted by state-affiliated actors 3% featured multiple parties 2% involved partners 51% involved organized criminal groups What tactics do they use? 51% of breaches included malware 62% of breaches featured hacking 81% of hacking-related breaches used stolen and/or weak passwords Attacks fall into 9 well known categories
Existing approaches are not working Missing basics due to complexity Cyber is complex is growing IT teams are overwhelmed Perimeters are disappearing Determined threat actors can break anything IT teams are missing security basics Less awareness and control Need to re-think security in 4 th Industrial Revolution
Distributed Segmentation & Virtualization Complexity and persistence can be used by us or against us Solution: make it easier for good guys and harder for bad actors Increase automation, segmentation & virtualization Increase difficulty and expense Learn from the bad actors
Distributed Segmentation & Virtualization Requirements (What to look for in vendors) Sandbox Visibility, Detection & Response DATA CENTER/PRIVATE CLOUD Endpoint Protection Secure Access Point NGFW Top-of-Rack Internal Segmentation FW Switching Web Servers Internal Segmentation FW SDN, Virtual Firewall Application Delivery Controller Database Protection CAMPUS IP Video Security Web Application Firewall Internal Segmentation FW Email Server PUBLIC CLOUDS Client Devices Client Devices Distributed Ent FW LTE Extension DCFW/ NGFW Email Security Internal Segmentation FW DDoS Protection Sandbox BRANCH OFFICE
Distributed Segmentation & Virtualization Requirements (What to look for in vendors) Unified security framework Certified and best-in-class tech and CSPs People, processes, technology, infrastructure 5 key questions to ask Allow auditing or pen testing? Are my apps ready for the cloud? Is your security scalable? Is your security aware? Do you offer segmentation? PUBLIC CLOUDS
Applying Distributed Network Segmentation & Virtualization SIEM/Analytics Branch or Tower Micro-segmentation Form factor: Virtual/Whitebox Branch or Tower Segmentation FW Form factor: Virtual/Whitebox DC / Cloud Services DC Segmentation FW Form factor: Appliance enb 3G/4G/5G wireless DC / Private Cloud UCPE Branch Access and off-load Transport / SDWAN Consumer Access and off-load
Next Steps Applying Insights Next week confirm current state Audit & pen test Identify critical workloads, systems and assets In three months move to steady state: High priority fixes & segmentation Determine proper controls, current state & future state IR retainer and darkweb services Within six months you should: Develop business case Select a security system which allows proactive policy to be set according to your organization s needs Implement project to protect all critical systems
Summary Digital transformation and threats driving distributed network segmentation and virtualization Cyber complexity will increase as Digital Transformation is widely adopted Look for solutions with end-to-end automated visibility, detection & response Network segmentation and virtualization is practical way forward
#RSAC